Security news, trends, analysis and practical advice

Security online
dark corners of network

15 10cwdsecurity

Cue another Israeli security success story -- Dome9 pockets Series B

The Israelis are at it again with yet another information security company coming out of the Israeli military picking up venture funding.

virus00 title

Looking back: Viruses that led to a path of destruction

Remember the devastation that these viruses caused?


Experian breach may have exposed data on 15M consumers linked to T-Mobile

A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers.

virtual encryption 175562932

GitHub expands hardware-based authentication to developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys.

Target store exterior

Report: Target failed on security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

Android character at MWC

New Android vulnerabilities put over a billion devices at risk of remote hacking

Newly discovered vulnerabilities in the way Android processes MP3 and MP4 files can allow attackers to compromise devices by tricking users to visit specifically-crafted Web pages.

See, we're still making payments on those servers

This healthcare software company's CEO also serves as Chief Information Security Officer -- and has very definite ideas about how to do security.

login prompt security screen

Dyreza malware steals IT supply chain credentials

New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.

alert detection prevent hacker hacking2

Critical flaw puts 500 million WinRAR users at risk of being pwned by unzipping a file

The creators of WinRAR basically shrugged off a critical remote code execution vulnerability that puts 500 million WinRAR users at risk of pwned if they unzip an infected file.

cloud reboot

Time for an individual security reboot

We as consumers share some measure of responsibility for the cybersecurity mess the country is in, especially those of us who are IT or security professionals. We need to reboot our individual practices to become part of the solution....

Elephant dog rain

BlueTalon brings Hadoop security down to the file system

Big data can mean big threats to security, but BlueTalon just launched what it calls the first-ever filtering and dynamic masking capabilities for use directly on the Hadoop Distributed File System (HDFS).

UCSF Medical Center at Mission Bay MRI

Thousands of medical devices are vulnerable to hacking, security researchers say

Thousands of medical devices, including MRI scanners, X-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.

Cybersecurity planet big data security

A Linux botnet is launching crippling DDoS attacks at more than 150Gbps

The security response team from Akamai Technologies has observed multiple attacks originating from a Linux botnet recently that have ranged from a few gigabits per second to over 150.

jason zander

Microsoft bolsters Azure in containers, security

Microsoft announced further enhancements to its Azure cloud platform, including a new container service and a new security center.

apple privacy

Apple, Microsoft wield privacy as marketing tool

Apple and Microsoft have both wheeled out fresh explanations of their privacy policies, explaining how different they are from Google and Facebook.

statistics stats big data analytics

Are datasets truly anonymized? Two well-suited researchers are going to find out

Researchers hope to develop privacy safeguards for very large datasets used in research. One of the researchers was part of the team which successfully de-anonymized Netflix's customer data the company provided in a 2006 contest...

Digital Key

Newly found TrueCrypt flaw allows full system compromise

A member of Google's Project Zero team has recently discovered two serious vulnerabilities in the driver that the TrueCrypt full disk encryption program installs on Windows systems.

apple privacy protection

If you read nothing else today please read Apple’s new privacy policy

Apple’s updated privacy policy promises personalization without sacrificing privacy

Load More